Hi, did you find anyone that can help?
I am looking for something similar and using SigPloit it can be done but requires a number of actions to get the attack right.
Interested to hear if found anyone.
A phone rat is having such like a file either sent, placed, clicked and installed on the targeted device the ss7 doesnt need any assistance when it intercepts the targetd information